mirror of https://github.com/01-edu/public.git
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
Zouhair AMAZZAL
e3dcf001dd
|
1 year ago | |
---|---|---|
.. | ||
README.md | 1 year ago |
README.md
General
Check the Repo content:
- A
README.md
file, Which explains all the steps to bypass all exercises. - All used tools and scripts.
Are all the required files present?
Setup the virtual machine:
- Download the virtual machine image hole-in-bin.ova. This image contains all the binaries you will need for the audit.
SHA1: 7db09b7a8fdfe25c286561dfa7ca5b50718bd60c
-
Load the virtual machine image into your virtualization software of choice (e.g., VirtualBox, VMWare).
-
Login using the provided credentials (username: user, password: user).
Ask the student to disassemble and explain the binaries:
Using a decompiler is forbidden, use a disassembler instead of it!
- The compiler is used to convert high-level programming language code into machine language code.
- The assembler converts assembly-level language code into machine language code.
Was the student capable to disassemble the binaries?
Was the student capable to explain the functionality of all the binaries?
Has the student shown the ability to understand and analyze binary structures and operations?
Did the student showcase an understanding of reverse engineering concepts?
Ask the student to exploit the binaries:
It's forbidden to use external scripts!